<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Latest PCI guidelines cause headaches all around</title>
	<atom:link href="https://www.lexiconn.com/blog/2015/06/latest-pci-guidelines-cause-headaches-all-around/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.lexiconn.com/blog/2015/06/latest-pci-guidelines-cause-headaches-all-around/</link>
	<description>All about e-Commerce, ShopSite, and Web Hosting</description>
	<lastBuildDate>Thu, 16 Dec 2021 19:59:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.1</generator>
	<item>
		<title>By: Bernd P</title>
		<link>https://www.lexiconn.com/blog/2015/06/latest-pci-guidelines-cause-headaches-all-around/#comment-565191</link>
		<dc:creator><![CDATA[Bernd P]]></dc:creator>
		<pubDate>Tue, 31 May 2016 01:27:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.lexiconn.com/blog/?p=7948#comment-565191</guid>
		<description><![CDATA[For my Opinion something is wrong with the feel for &quot;Maximum Security&quot;.
As far as it is known that TLS 1.0 is at least in danger to be vulnerable if not properly patched/mitigated or in case if weak Suites are in use, it makes no Sense to further allow this potentially insecure Protocol Version.
So, the most modern Protocol we have, IS TLS 1.2 and thus to be the Standard for now. Since PFS can only be properly supported on TLS 1.2, this is the next Target to reach ASAP, means by removing old non-PFS Suites from any possible Server. Immediately. PFS is already supported in all modern Clients. Older ones or old Devices w old OSes are - per Definition - unsafe to use and therefor should no longer be enabled and not allowed to be used.
Servers that cannot be upgraded/patched, are simply and unluckily Subject to be removed and replaced by newer ones. I consider it irresposible to even &quot;tolerate&quot; the use of potentially insecure Configurations, Suites w/o PFS, TLS 1.0, Non-HSTS Policies for another two Years. The harshest Cut is the best Cut. In the Name of Communication Security and Privacy. And also regarding that TLS1.3 is already on the Draft Sheets!. Which is even a far better Concept bc really strict. So, working towards these Edges as soon we can and already now is the best Concept for secure Server Operations already today. Lethargy or &quot;comfortable Slowliness&quot; concerning Security Implementation is no Concept. Every additional TLS1.0 Day is a bad Day. Potentially a Risk. And this is enough Reason. And IF exploited the one or the other Day, by someone, it becomes a Catastrophy. Tighten your Systems. 
&quot;Bullet-Proof&quot; like Ivan Ristic says. Now! And not after another two Years!]]></description>
		<content:encoded><![CDATA[<p>For my Opinion something is wrong with the feel for &#8220;Maximum Security&#8221;.<br />
As far as it is known that TLS 1.0 is at least in danger to be vulnerable if not properly patched/mitigated or in case if weak Suites are in use, it makes no Sense to further allow this potentially insecure Protocol Version.<br />
So, the most modern Protocol we have, IS TLS 1.2 and thus to be the Standard for now. Since PFS can only be properly supported on TLS 1.2, this is the next Target to reach ASAP, means by removing old non-PFS Suites from any possible Server. Immediately. PFS is already supported in all modern Clients. Older ones or old Devices w old OSes are &#8211; per Definition &#8211; unsafe to use and therefor should no longer be enabled and not allowed to be used.<br />
Servers that cannot be upgraded/patched, are simply and unluckily Subject to be removed and replaced by newer ones. I consider it irresposible to even &#8220;tolerate&#8221; the use of potentially insecure Configurations, Suites w/o PFS, TLS 1.0, Non-HSTS Policies for another two Years. The harshest Cut is the best Cut. In the Name of Communication Security and Privacy. And also regarding that TLS1.3 is already on the Draft Sheets!. Which is even a far better Concept bc really strict. So, working towards these Edges as soon we can and already now is the best Concept for secure Server Operations already today. Lethargy or &#8220;comfortable Slowliness&#8221; concerning Security Implementation is no Concept. Every additional TLS1.0 Day is a bad Day. Potentially a Risk. And this is enough Reason. And IF exploited the one or the other Day, by someone, it becomes a Catastrophy. Tighten your Systems.<br />
&#8220;Bullet-Proof&#8221; like Ivan Ristic says. Now! And not after another two Years!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
